KR20170001864A - System and method for verifying validity of digital image - Google Patents
System and method for verifying validity of digital image Download PDFInfo
- Publication number
- KR20170001864A KR20170001864A KR1020150091173A KR20150091173A KR20170001864A KR 20170001864 A KR20170001864 A KR 20170001864A KR 1020150091173 A KR1020150091173 A KR 1020150091173A KR 20150091173 A KR20150091173 A KR 20150091173A KR 20170001864 A KR20170001864 A KR 20170001864A
- Authority
- KR
- South Korea
- Prior art keywords
- digital image
- portable terminal
- information
- verification information
- photographed
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
Description
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a digital image validation system and method, and more particularly, to a digital image validation system and method for verifying whether a digital image received from a portable terminal is an image captured by the portable terminal will be.
Recently, wired / wireless communication networks have been developed and various online services such as online commerce, internet banking, and online certificate issuance have been provided as computers and the Internet have become popular in homes. Because of the nature of these services, it is very important that they authenticate themselves to ensure that the user has the right to use the service.
It is the most authentic authentication method that the user himself or herself visits the bank or the certificate issuing institution. However, since the online service is very troublesome in terms of the nature of the online service, the user scans or photographs his or her ID card or facial photograph, Non-face authentication technologies are emerging in the certification body that perform identity verification through transmitted pictures. However, if the current non-face authentication technology is used, the image of the ID of the other person (the person to be hijacked) may be collected through an illegal route, and the abuse of the image may occur.
In addition, there are cases where the insurer of a car inspects the mileage or the installation of a black box and provides a service to discount the insurance premium. In such a case, there is a case where forged pictures are transmitted. Even if you do not have the goods, there are also cases where you try to steal photos of others and pretend that you have the goods.
As the number of cases of counterfeiting and theft of photographs is increasing, a method for preventing the counterfeiting or theft is widely required.
SUMMARY OF THE INVENTION Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and an object of the present invention is to provide a system and method for verifying that a photograph transmitted from a user's portable terminal is a photograph taken by the portable terminal, Method.
According to an aspect of the present invention, there is provided an image processing apparatus including an image receiving module that receives a digital image from a portable terminal, an extraction module that extracts first verification information that is at least a part of the metadata included in the received digital image, And a verification module for verifying the validity of the digital image by comparing the first verification information and the second verification information with an acquisition module for obtaining second verification information corresponding to the portable terminal A digital image validation system is provided.
In one embodiment, the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information on which the digital image was photographed, Wherein when the first verification information includes the location information of the place where the digital image is photographed, the second verification information includes the location information of the portable terminal, and the first verification information indicates the location of the digital image The second verification information includes identification information of the portable terminal, and when the first verification information includes time information on which the digital image was captured, And may include time information of receiving the digital image from the terminal.
In one embodiment, when the first verification information includes location information of a place where the digital image is photographed, the acquiring module acquires location information of the portable terminal from the portable terminal or a mobile communication terminal System, and when the first verification information includes identification information of a device that has photographed the digital image, identification information of the portable terminal can be received from the portable terminal or a mobile communication company system subscribed to by the portable terminal have.
In one embodiment, when the first verification information includes positional information of a place where the digital image is photographed, the verification module may determine that the position of the place where the digital image was photographed and the position of the portable terminal are located at a predetermined position And if the first verification information includes identification information of a device that has photographed the digital image, whether the identification information of the photographed device and the identification information of the portable terminal coincide with each other And when the first verification information includes the time information of the digital image taken, a time when the digital image was photographed and a time when the digital image was received from the portable terminal satisfy a predetermined time condition Can be determined.
In one embodiment, the digital image may be one of a facial image of the user of the portable terminal, an ID image, and an image of a unique authentication object, which is captured by the portable terminal.
In one embodiment, the digital image validation system may further comprise a personal authentication module that performs non-face-to-face authentication based on the digital image.
In one embodiment, the metadata included in the digital image is data encrypted with a predetermined encryption method for the purpose of preventing forgery and falsification, and the validity verification system of the digital image includes a step of encrypting the metadata The extraction module may extract the first verification information from the decrypted metadata.
According to another aspect of the present invention, there is provided an image processing method including the steps of receiving an image from a portable terminal, extracting first verification information that is at least a part of metadata included in the received digital image, A verification step of verifying the validity of the digital image by comparing the first verification information and the second verification information with each other, the obtaining step of obtaining second verification information corresponding to the portable terminal, A method for validating a digital image is provided.
In one embodiment, the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information on which the digital image was photographed, Wherein when the first verification information includes the location information of the place where the digital image is photographed, the second verification information includes the location information of the portable terminal, and the first verification information indicates the location of the digital image The second verification information includes identification information of the portable terminal, and when the first verification information includes time information on which the digital image was captured, And may include time information of receiving the digital image from the terminal.
In one embodiment, the acquiring step may include acquiring location information of the portable terminal when the first verification information includes location information of a place where the digital image is photographed, Wherein the first verification information includes identification information of a device that has photographed the digital image, the identification information of the portable terminal may be transmitted to the portable terminal or the mobile communication terminal From the base station.
In one embodiment, when the first verification information includes location information of a place where the digital image is photographed, the verification step may include a step of determining whether the position of the place where the digital image was photographed, Determining whether the condition is satisfied;
Determining whether the identification information of the device photographed with the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image, And judging whether the time at which the digital image was photographed and the time at which the digital image was received from the portable terminal satisfy a predetermined time condition when the verification information includes time information of the digital image taken .
In one embodiment, the digital image may be one of a facial image of the user of the portable terminal, an ID image, and an image of a unique authentication object, which is captured by the portable terminal.
In one embodiment, the method for validating the digital image may further include a step of authenticating the user who performs non-face-to-face authentication based on the digital image.
In one embodiment, the metadata included in the digital image is data encrypted with a predetermined encryption method for the purpose of preventing forgery and falsification, and the method for verifying the validity of the digital image is a method of encrypting the metadata using the decryption method corresponding to the encryption method. And the extracting step may include extracting the first verification information from the decrypted metadata.
According to another aspect of the present invention, there is provided a computer program installed in a data processing apparatus and stored in a recording medium for performing the above-described method.
According to another aspect of the present invention there is provided a system for validating a digital image, the system comprising a processor and a memory storing a program, wherein the program, when executed by the processor, There is provided a digital image validation system for performing the above-described method.
According to an embodiment of the present invention, it is possible to provide a system and method for verifying that a photograph transmitted from a portable terminal of a user who intends to perform non-face-to-face authentication is a photograph taken by the portable terminal.
A system and method for validating a digital image according to an embodiment of the present invention may be used for non-face-to-face authentication. In this case, the digital image transmitted by the portable terminal may be a facial image or ID image of the user of the portable terminal photographed by the portable terminal, and the digital image may be used for non-face-to-face authentication. That is, the system for verifying the validity of the digital image verifies that the ID photo to be used for non-face-to-face authentication is a photo captured by the user's own portable terminal to be authenticated by the ID card, I can verify that the photo was taken, in other words, it was occupied by the person at the time of taking the ID card.
Also, according to an embodiment of the present invention, the metadata used for validity verification of a digital image is encrypted, inserted into a digital image, decrypted and extracted to extract metadata, thereby preventing forgery and alteration of metadata.
BRIEF DESCRIPTION OF THE DRAWINGS A brief description of each drawing is provided to more fully understand the drawings recited in the description of the invention.
FIG. 1 is a conceptual illustration of a digital image validation system according to an exemplary embodiment of the present invention. Referring to FIG.
2 is a flowchart illustrating a method for verifying the validity of a digital image according to an exemplary embodiment of the present invention.
3 is a block diagram illustrating a schematic configuration of a digital image validation system according to an exemplary embodiment of the present invention.
FIG. 4 is a flowchart illustrating a method for validating a digital image according to an exemplary embodiment of the present invention and a non-face authentication method using the same.
BRIEF DESCRIPTION OF THE DRAWINGS The present invention is capable of various modifications and various embodiments, and specific embodiments are illustrated in the drawings and described in detail in the detailed description. It is to be understood, however, that the invention is not to be limited to the specific embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.
The terms first, second, etc. may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise.
In this specification, the terms "comprises" or "having" and the like refer to the presence of stated features, integers, steps, operations, elements, components, or combinations thereof, But do not preclude the presence or addition of features, numbers, steps, operations, components, parts, or combinations thereof.
Also, in this specification, when any one element 'transmits' data to another element, the element may transmit the data directly to the other element, or may be transmitted through at least one other element And may transmit the data to the other component. Conversely, when one element 'directly transmits' data to another element, it means that the data is transmitted to the other element without passing through another element in the element.
Hereinafter, the present invention will be described in detail with reference to the embodiments of the present invention with reference to the accompanying drawings. Like reference symbols in the drawings denote like elements.
FIG. 1 is a conceptual illustration of a digital image validation system according to an exemplary embodiment of the present invention. Referring to FIG. Referring to FIG. 1, a digital
The digital
For this, the digital
Meanwhile, the digital
Metadata is structured data about data, and it is data that explains other data. In particular, the metadata of a digital image includes photograph information such as exposure, flash use, resolution, and photo size, information (device manufacturer, device identification, model name, etc.) of the device that captured the digital image, And geographical location information of the photographed place, as meta data.
A representative format for storing metadata of a digital image is, but not limited to, an EXchangeable Image File format (Exif).
In one embodiment, the digital
Meanwhile, the digital
The second verification information is the same kind of information corresponding to the first verification information, and may be information corresponding to the portable terminal.
The second verification information is the same kind of information as the first verification information. For example, if the first verification information is the location information, the second verification information may also be the location information, Information, device identification information, and time information, the second verification information may also include location information, device identification information, and time information.
Meanwhile, the digital
The mobile communication company to which the
According to an embodiment, the mobile phone 220 may be a computing device including a smart phone, a tablet PC, a PDA (Personal Digital Assistant), a wireless computing device including a handheld device having other wireless connection capabilities, Or a processing device connected to a modem.
2 is a flowchart briefly illustrating a method for verifying the validity of a digital image according to an exemplary embodiment of the present invention.
Referring to FIG. 2, the
Then, the digital
Meanwhile, the digital
The digital
The digital image validation system and method as described above can be used for non-face-to-face authentication. In this case, the digital image transmitted by the
FIG. 3 is a block diagram illustrating a schematic configuration of a digital
The digital
In this specification, a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware. For example, the module may refer to a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and it does not necessarily mean a physically connected code or a kind of hardware But can be easily deduced to the average expert in the field of the present invention.
The
The
The
The metadata may be included in the digital image and may be data regarding the digital image itself. As described above, the metadata of the digital image may be in Exif format, but is not limited thereto.
The
According to an embodiment, the first verification information may include at least one of position information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed .
The location information may be Global Positioning System (GPS) information.
The identification information of the device may be unique identification information given to the device, and may be unique information that can specify the device, such as the serial number of the device.
The
Meanwhile, in one embodiment, the metadata included in the digital image may be data encrypted with a predetermined encryption method for preventing forgery and falsification.
In this case, the
The encryption / decryption method used in the digital
Meanwhile, the
The information corresponding to the portable terminal may mean information about the portable terminal collected by the portable terminal, received from the portable terminal, or collected by a predetermined system interlocked with the portable terminal. Meanwhile, since the information included in the second verification information includes the same kind of information as the information included in the first verification information, if the first verification information includes the location information of the place where the digital image was captured , The second verification information may include location information of the portable terminal, and when the first verification information includes identification information of a device that has photographed the digital image, And the second verification information may include time information of receiving the digital image from the portable terminal when the first verification information includes the time information on which the digital image was captured.
When the first verification information includes the location information of the place where the digital image is photographed, the acquiring
When the first verification information includes the time information of the digital image, the
If the first verification information includes the identification information of the device that photographed the digital image, the identification information of the portable terminal may be transmitted to the
The
More specifically, when the first verification information includes the location information of the place where the digital image is photographed, the
The fact that two positions satisfy a predetermined position condition may mean that the two positions correspond to a predefined positional relationship. For example, if the distance between the position of the place where the digital image is photographed and the position of the portable terminal is within a predetermined limit distance, the
If the first verification information includes the identification information of the device that photographed the digital image, the
If the first verification information includes the time information of the digital image taken, the
The satisfaction of a predetermined time condition between two times can mean that the two positions correspond to a predefined time relationship. For example, when the difference between the time at which the digital image is captured and the time at which the digital image is received from the portable terminal is within a predefined limit period, the
When the position of the place where the digital image is photographed and the position of the portable terminal satisfy a predetermined positional condition, the
Meanwhile, the digital image may be any one of a facial image of the user of the portable terminal, an ID image, and a unique authentication object (IC card, OTP device, security card) captured by the portable terminal. In this case, Can be used for non-confidential self-certification.
Here, the unique authentication object may be an IC card, an OTP device, a security card, a credit card, or the like, which may be various objects or devices that can be used for authentication of the owner.
According to an embodiment, the digital
When the digital image is an ID image, the
When the digital image is an image of a unique authentication object, the digital image includes predetermined information (e.g., unique serial number of the IC card, unique serial number of the OTP device, unique serial number of the secure card, The card number of the credit card, and the expiration date) may be included in the digital image, and the
FIG. 4 is a flowchart illustrating a method for validating a digital image according to an exemplary embodiment of the present invention and a non-face authentication method using the same.
Referring to FIG. 4, the
Then, the digital
The first verification information may include location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, and / or time information when the digital image was photographed.
Accordingly, the digital
Meanwhile, the digital
More specifically, the digital
Then, the digital
If it is determined that the ID image is valid, the digital
Meanwhile, the digital image
Meanwhile, according to an embodiment, the digital
Meanwhile, the authentication method according to the embodiment of the present invention can be implemented in a computer-readable program command form and stored in a computer-readable recording medium. The control program and the target program according to the embodiment of the present invention And can be stored in a computer-readable recording medium. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored.
Program instructions to be recorded on a recording medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of software.
Examples of the computer-readable recording medium include magnetic media such as a hard disk, a floppy disk and a magnetic tape, optical media such as CD-ROM and DVD, a floptical disk, And hardware devices that are specially configured to store and execute program instructions such as magneto-optical media and ROM, RAM, flash memory, and the like. The above-mentioned medium may also be a transmission medium such as a light or metal wire, wave guide, etc., including a carrier wave for transmitting a signal designating a program command, a data structure and the like. The computer readable recording medium may also be distributed over a networked computer system so that computer readable code can be stored and executed in a distributed manner.
Examples of program instructions include machine language code such as those produced by a compiler, as well as devices for processing information electronically using an interpreter or the like, for example, a high-level language code that can be executed by a computer.
The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.
It is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. .
Claims (16)
An extracting module for extracting first verification information that is at least a part of metadata included in the received digital image;
An acquiring module that acquires second verification information corresponding to the first verification information, the second verification information corresponding to the first verification information; And
And a verification module for comparing the first verification information and the second verification information to verify the validity of the digital image.
Wherein the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed,
When the first verification information includes position information of a place where the digital image is captured, the second verification information includes position information of the portable terminal,
Wherein when the first verification information includes identification information of a device that has captured the digital image, the second verification information includes identification information of the portable terminal,
Wherein the second verification information includes time information indicating that the digital image has been received from the portable terminal when the first verification information includes time information on the digital image taken.
The acquisition module,
Receiving the location information of the portable terminal from the portable terminal or a mobile communication company system subscribed to by the portable terminal when the first verification information includes the location information of the place where the digital image is photographed,
Wherein the first verification information includes identification information of a device that has photographed the digital image, a validity verification system for digital image that receives the identification information of the portable terminal from the mobile terminal or the mobile communication company subscription system of the portable terminal .
Wherein the verification module comprises:
Determining whether a position of the place where the digital image is photographed and a position of the portable terminal satisfy a predetermined positional condition when the first verification information includes positional information of a place where the digital image is photographed,
Determining whether the identification information of the device photographed with the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image,
Wherein the first verification information includes time information on the time when the digital image is captured and a digital value that determines whether a time when the digital image was captured and a time when the digital image was received from the portable terminal satisfies a predetermined time condition, Image validation system.
Wherein the digital image is any one of a facial image of the user of the portable terminal, an ID image, and an image of a unique authentication object, which is captured by the portable terminal.
Wherein the digital image validation system comprises:
And a personal authentication module for performing non-face-to-face authentication based on the digital image.
Wherein the metadata included in the digital image is data encrypted with a predetermined encryption method for forgery prevention,
Wherein the digital image validation system comprises:
And a decryption module for decrypting the metadata using a decryption method corresponding to the encryption method,
Wherein the extraction module comprises:
And extracting the first verification information from the decrypted metadata.
An extraction step of extracting first verification information which is at least a part of metadata received from the received digital image;
An acquisition step of acquiring second verification information corresponding to the first verification information, the second verification information corresponding to the same kind of information corresponding to the first verification information; And
And verifying the validity of the digital image by comparing the first verification information and the second verification information.
Wherein the first verification information includes at least one of location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, or time information when the digital image was photographed,
When the first verification information includes position information of a place where the digital image is captured, the second verification information includes position information of the portable terminal,
Wherein when the first verification information includes identification information of a device that has captured the digital image, the second verification information includes identification information of the portable terminal,
Wherein the second verification information includes time information of the digital image received from the portable terminal when the first verification information includes time information on the digital image taken.
The acquiring step includes:
Receiving the location information of the portable terminal from the portable terminal or a mobile communication company system subscribed to by the portable terminal when the first verification information includes location information of a place where the digital image is photographed,
And receiving the identification information of the portable terminal from a mobile communication company system subscribed to by the portable terminal or the portable terminal when the first verification information includes identification information of the device that photographed the digital image, .
Wherein the verifying step comprises:
Determining whether a position of a place where the digital image is photographed and a position of the portable terminal satisfy a predetermined positional condition when the first verification information includes positional information of a place where the digital image is photographed;
Determining whether the identification information of the device photographed with the digital image matches the identification information of the portable terminal when the first verification information includes the identification information of the device that photographed the digital image; And
Determining whether the time at which the digital image was captured and the time at which the digital image was received from the portable terminal satisfy a predetermined time condition when the first verification information includes time information of the digital image taken; The method comprising the steps of:
Wherein the digital image is any one of a facial image of the user of the portable terminal, an ID image, and an image of a unique authentication object, which is captured by the portable terminal.
A method of validating a digital image,
And authenticating the non-face person based on the digital image.
Wherein the metadata included in the digital image is data encrypted with a predetermined encryption method for forgery prevention,
A method of validating a digital image,
Further comprising a decoding step of decoding the metadata by a decoding method corresponding to the encryption method,
Wherein the extracting step comprises:
And extracting the first verification information from the decrypted metadata.
A processor;
And a memory storing the program, wherein the program, when executed by the processor, causes the digital image validation system to perform the method according to any one of claims 8 to 14, Validation system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150091173A KR20170001864A (en) | 2015-06-26 | 2015-06-26 | System and method for verifying validity of digital image |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150091173A KR20170001864A (en) | 2015-06-26 | 2015-06-26 | System and method for verifying validity of digital image |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170001864A true KR20170001864A (en) | 2017-01-05 |
Family
ID=57835592
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150091173A KR20170001864A (en) | 2015-06-26 | 2015-06-26 | System and method for verifying validity of digital image |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20170001864A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20200020457A (en) * | 2018-08-17 | 2020-02-26 | 네이버 주식회사 | Method and system for providing reward based on follow and review information for list of point of interest |
KR20200047504A (en) * | 2020-04-28 | 2020-05-07 | 네이버 주식회사 | Method and system for providing reward based on follow and review information for list of point of interest |
KR20200062158A (en) * | 2018-09-12 | 2020-06-03 | 네이버 주식회사 | Method and system for filtering image using point of interest |
KR20210033957A (en) * | 2020-04-28 | 2021-03-29 | 네이버 주식회사 | Method and system for providing reward based on follow and review information for list of point of interest |
KR102568698B1 (en) * | 2022-07-13 | 2023-08-22 | 한국전자기술연구원 | UAV-based image file/transmission validation system and method |
-
2015
- 2015-06-26 KR KR1020150091173A patent/KR20170001864A/en unknown
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20200020457A (en) * | 2018-08-17 | 2020-02-26 | 네이버 주식회사 | Method and system for providing reward based on follow and review information for list of point of interest |
KR20200062158A (en) * | 2018-09-12 | 2020-06-03 | 네이버 주식회사 | Method and system for filtering image using point of interest |
KR20200047504A (en) * | 2020-04-28 | 2020-05-07 | 네이버 주식회사 | Method and system for providing reward based on follow and review information for list of point of interest |
KR20210033957A (en) * | 2020-04-28 | 2021-03-29 | 네이버 주식회사 | Method and system for providing reward based on follow and review information for list of point of interest |
KR102568698B1 (en) * | 2022-07-13 | 2023-08-22 | 한국전자기술연구원 | UAV-based image file/transmission validation system and method |
WO2024014615A1 (en) * | 2022-07-13 | 2024-01-18 | 한국전자기술연구원 | Image file/transmission validity verification system and method based on unmanned aerial vehicle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101703712B1 (en) | System and method for verifying validity of digital image taken by mobile terminal | |
JP7240030B2 (en) | Identity authentication method, device and server | |
US11562363B2 (en) | Hardware and token based user authentication | |
US20220417739A1 (en) | Secure data communication | |
US10320807B2 (en) | Systems and methods relating to the authenticity and verification of photographic identity documents | |
AU2010282394B2 (en) | An intelligent peripheral device and system for the authentication and verification of individuals and/ or documents through a secure multifunctional authentication service with data storage capability | |
AU2018348549B2 (en) | Authentication of a person using a virtual identity card | |
KR20170001864A (en) | System and method for verifying validity of digital image | |
US10990776B2 (en) | Methods and devices for biometric verification | |
US20160196509A1 (en) | Ticket authorisation | |
KR101748136B1 (en) | Method for certification using digital image, application system, and authentication system thereof | |
KR20170018127A (en) | Method for certification using digital image, application system, and authentication system thereof | |
JP6690686B2 (en) | Account opening system, account opening method, and program | |
KR20170017190A (en) | Apparatus for verifying biometric information and mobile authentication and payment method using thereof | |
KR20170121737A (en) | Method for Providing Non-Facing Certification by using Camera | |
KR100886410B1 (en) | Authentication system and method using a time-varying code | |
Reagan et al. | Identity Management for Large e-Government Populations. |